MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 025a5df32b0b830396285ab7cc86bd99072a9046769fe8778e14a6360410603a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 25 File information Comments

SHA256 hash: 025a5df32b0b830396285ab7cc86bd99072a9046769fe8778e14a6360410603a
SHA3-384 hash: 1852dd063ad8828eeb08b8a1d8d712357d7542a41441a1853853c730bb64a18063c7ca340cd73d99ad7db73988b54eff
SHA1 hash: 7284b797d022f6faf045480d055ee83728ab5525
MD5 hash: 884866f0185bd2eb297993e32edf8c3c
humanhash: green-eleven-mississippi-fillet
File name:rhsremotesupportv2.exe
Download: download sample
Signature RustyStealer
File size:17'763'208 bytes
First seen:2025-12-01 20:36:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 94dddffc8dd646b8d371573e31e5b01b (1 x RustyStealer)
ssdeep 393216:VOJqmaVDc0G0/bIT3fTQW6OKEIrqNp/8zCEJUGwLa3c:VOJqmAcegvMOKEazrJUGwLT
TLSH T15207C002FAC280F9C85B01B0696FF33ED7396D244738C6A3DBE43E59ADB1790596A117
TrID 42.5% (.EXE) UPX compressed Win64 Executable (70117/5/12)
25.2% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
16.4% (.EXE) UPX compressed Win32 Executable (27066/9/6)
6.3% (.EXE) Win64 Executable (generic) (10522/11/4)
3.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter abuse_ch
Tags:exe RustyStealer upx-dec


Avatar
abuse_ch
UPX decompressed file, sourced from SHA256 aa524d9e1ebbcee41f7927cfe90f9db9fb846005be4e05ded2da3f0943db69c8
File size (compressed) :7'288'712 bytes
File size (de-compressed) :17'763'208 bytes
Format:win32/pe
Packed file: aa524d9e1ebbcee41f7927cfe90f9db9fb846005be4e05ded2da3f0943db69c8

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
NL NL
Vendor Threat Intelligence
Details
No details
Malware family:
n/a
ID:
1
File name:
rhsremotesupportv2.exe
Verdict:
Suspicious activity
Analysis date:
2025-12-01 20:42:26 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
dropper virus sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the process to change network settings
Сreating synchronization primitives
Restart of the analyzed sample
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Running batch commands
DNS request
Connection attempt
Sending a custom TCP request
Launching the process to change the firewall settings
Moving a file to the %AppData% subdirectory
Sending an HTTP GET request
Creating a window
Searching for the window
Using the Windows Management Instrumentation requests
Enabling autorun with the shell\open\command registry branches
Launching a tool to kill processes
Gathering data
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1823925 Sample: rhsremotesupportv2.exe Startdate: 01/12/2025 Architecture: WINDOWS Score: 48 31 turn.hoptodesk.com 2->31 33 signal.hoptodesk.com 2->33 35 api.hoptodesk.com 2->35 8 rhsremotesupportv2.exe 3 18 2->8         started        process3 dnsIp4 37 103.114.163.18, 3478, 49693 DEDIPATH-LLCUS Singapore 8->37 39 api.hoptodesk.com 104.21.68.152, 443, 49690, 49697 CLOUDFLARENETUS United States 8->39 41 3 other IPs or domains 8->41 29 C:\Users\user\AppData\Local\Temp\sciter.dll, PE32 8->29 dropped 43 Uses netsh to modify the Windows network and firewall settings 8->43 45 Modifies the windows firewall 8->45 13 rhsremotesupportv2.exe 1 8->13         started        15 cmd.exe 1 8->15         started        17 netsh.exe 2 8->17         started        file5 signatures6 process7 process8 19 netsh.exe 2 13->19         started        21 taskkill.exe 1 15->21         started        23 conhost.exe 15->23         started        25 conhost.exe 17->25         started        process9 27 conhost.exe 19->27         started       
Verdict:
inconclusive
YARA:
6 match(es)
Tags:
Executable Html PE (Portable Executable) PE File Layout Win 32 Exe x86
Verdict:
Malicious
Threat:
NetworkReferences.Malware.Generic
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery persistence privilege_escalation
Behaviour
Kills process with taskkill
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
Checks computer location settings
Loads dropped DLL
Modifies Windows Firewall
Unpacked files
SH256 hash:
025a5df32b0b830396285ab7cc86bd99072a9046769fe8778e14a6360410603a
MD5 hash:
884866f0185bd2eb297993e32edf8c3c
SHA1 hash:
7284b797d022f6faf045480d055ee83728ab5525
SH256 hash:
b178b78a6b3f58b084be50917cfebe88348605a7229674b8315d8ef87acc6eb1
MD5 hash:
91f0ab92f1c5df2c18481e3d7771876d
SHA1 hash:
63d7b3d4edbce013067c524f77e7e765658f62f7
SH256 hash:
996983c652f0736bae759a20b2145991ffdf83b87b4e2b7adc638b2ab7353800
MD5 hash:
523c7ee52065d89dbeaba303bf9e29a9
SHA1 hash:
10dc15d3de3f7f5071a7a553f097a4c873870fd9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:dgaagas
Author:Harshit
Description:Uses certutil.exe to download a file named test.txt
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:TelegramAPIMalware_PowerShell_EXE
Author:@polygonben
Description:Hunting for pwsh malware using Telegram for C2
Rule name:telegram_bot_api
Author:rectifyq
Description:Detects file containing Telegram Bot API
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe 025a5df32b0b830396285ab7cc86bd99072a9046769fe8778e14a6360410603a

(this sample)

Comments